Hey Mario,

I think whether or not its a security issue depends on the permissions and 
the contents and capability of the application being debugged; 
the way I understand this is that being able to debug an app means you are 
allowed to execute code in the context of the application i.e. with the PID 
and GIDs of the target application; this means you and your unauthenticated 
code automatically has all the privileges of the vulnerable app. 

*It also means you can skew the results of forensic audits on the device, 
by blaming on piece of software for doing something it never had the 
capability to or was intended to do, this then threatens reputational and 
possibly legal action against a developer or company responsible for the 
debuggable app.*

For instance if you have something like:


   1. INTERNET
   2. READ_PHONE STATE
   3. SEND_SMS
   4. WRITE_EXTERNAL_STORAGE
   5. RECEIVE_SMS
   6. READ_SMS
   7. ACCESS_COARSE_LOCATION
   8. READ_CONTACTS
   9. ACCESS_FINE_LOCATION
   10. WRITE_SMS

permissions, executing code inside an app with these permissions would be a 
likely attack vector for any adversary that would like to read sms's, 
exfiltrate data from the app or the phone, send SMS without needing any 
form of authentication or leak the victims contacts list I could go on.

*Also on the actual fix for the code, it requires that you either have ROOT 
or ADB_SHELL permission, the key here being the ADB_SHELL permission which 
is a considerably lower privilege---2000 or something---when compared to 
root, and basically anyone with physical access to the device has this 
permission.*

I still consider this a pretty serious security vulnerability but only 
depending on how much data and what kind of data the developers or users 
expose because of it, and sure the complexity of these attack vectors may 
be high because of the need to physically access the device---I mean how 
hard is to snatch someones phone?---though it does present a significant 
risk.



On Thursday, August 29, 2013 1:10:11 PM UTC+2, Keith Makan wrote:
>
>
> I'm largely familiar with risk around publishing a de-buggable app to the 
> market,
> it basically breaks down to an attacker being able to perform remote code 
> execution
> and leak the values of private and internal fields from the object 
> instances and static fields.
>
> *My questions is,* does anyone know to exploit a debuggable app to 
> uncontrolled achieve code exec?
>
> Regards
>

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-security-discuss+unsubscr...@googlegroups.com.
To post to this group, send email to android-security-discuss@googlegroups.com.
Visit this group at http://groups.google.com/group/android-security-discuss.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to